Freeware Files | Download Free Software

Thursday, 10 November 2011 17:19

Boost Your Computer Security With Ten Easy Steps

Rate this item
(10 votes)

In our days worldwide web is very dangerous for novice users and it’s very easy to get infected or even lost important data.

Nowadays, computers are part of our office or household furniture. However, we all have increasing amounts of valuable data stored on our computers and it's worth being aware of the ongoing risks, so here we will take a look at the best ways to improve and immunize our PC security. 

 Of course adding some computer security features to a pc costs a little extra money.

It is essential to do to keep off attacks from the rogues out there determined to trouble home pc users as well as large companies. Viruses can modify in seriousness such as harmless but annoying e-mails or Spam applications delivered to PCs that can wipe out all the data stored on a computer.

 

Ten steps to follow - Improve your computer security: 

1.Operating System: Whatever operating system you use, keep it updated frequently. For example, turning on the auto-update in Windows will boost your security. Microsoft releases frequent fixes to assailable areas of OS security so this is critically important.

2. Password Protection: Another good step to computer security is to put a holdback to unauthorized persons, use your computer. You can protect your login-id with a password. With this step you can ensure that only you can access confidential information on your computer. Never reveal your passwords to other users, do not write them down. Try to make your passwords unique with a combination of uppercase/lowercase letters, numbers and symbols.

3. Firewall Protection: Your computer security should be enhanced also, by adding a firewall, especially if you are part of a home or work network. The firewall or NAT setting on your router should be switched on as these could leave you exposed to crackers or indeed your neighbors might be able to view, what you are doing on the internet.

4. Antivirus Program: Ensure your pc has up to date anti-virus software installed. This is a key element of computer security and will help detect and remove viruses, malware, as well as block Spam e-mails.

5. Regular Scan: Your anti-virus software may do regular background scans, but it’s a good idea to run manually at least once a week. This will help clean up your system by deleting unwanted cookies and temporary internet files.

6. E-Mail Links: Don’t visit websites by clicking links attached to e-mails. Most of these links taking you to a home page asking for login or account details are scams. Any details entered here can be used by the hacker who set up the scam link.

7. E-Mail Attachments: Be very wary of attachments to e-mails sent to you, particularly if they are from persons unknown to you. These could potentially carry a virus that will prove damaging to your computer. A good computer security tip is to ignore attachments from unknown sources and delete the e-mail. You can save any attachments or downloads to your desktop and scan them with the anti-virus software.

8. Suspicious E-Mails: This breach of computer security is sometimes known as phishing. Ignore every e-mails that look fishy and delete them as these could break your computer security. Ignore any e-mails announcing to be from your bank or someone else you hold an account with asks for personal details or passwords.

9. Websites: Be wary of websites you wish to enter. Some anti-virus programs offer warnings next to websites to indicate whether they can be trusted. Avoid clicking on a website if it is not rated as trustworthy.

10. Online Payments: If you need to make a payment online, ensure that the payment screen is protected. The page will usually indicate that it is secure and may have a padlock image at the top of the page.

Anyone still not convinced may want to keep in mind some of the events about viruses. In January 2007 a worm called Storm appeared on the scene. Few months later, it was believed that 50 million computer systems had been infected by this worm. Following these steps is a must, if you want to protect you and your personal information and data from cyber thieves.

Subscribe via RSS or Email:

 
Read 7425 times Last modified on Tuesday, 25 December 2012 11:38
Panagiotis K.

"Hi there , my name is Panagiotis K. and i like writing articles about computers and technology. Do not hesitate to share your ideas with me and add your comments."

 

  1. Latest News
  2. Most Popular
  3. Top Rated
  4. Latest Comments
  • Michael A
    Why they do not shut down the company that provides the faulty patchwork systems that make such malware first possible? No, not because of a faulty ...

    Read more...

     
  • Moubreb
    The people at any router between You and facebook can read Your communication if: 1. You're using an http: connection 2. A fake facebook certificate ...

    Read more...

     
  • theoctagon
    You could always just use what's already baked in: Android Device Manager. https://www.google.com/android/devicemanager

    Read more...

     
  • Michael A
    AFAIR the patch was available one day after the discovery of heartbleed. That normal with Free Software. Only mislead users of commercial scrap have ...

    Read more...

next
prev

Quick Search

Powered by Liquidtroll
Prev Next

Windows 8 Consumer Preview: Ready to Download

01-10-2012 Hits:3046 Microsoft Panagiotis K. - avatar Panagiotis K.

Windows 8 Consumer Preview: Ready to Download

Available for download is a prerelease version of Windows 8 for those who know enough to install an operating system from scratch. The version of Windows 8 Consumer Preview can be...

Twitter app downloads could put users at risk

20-04-2014 Hits:817 Security Panagiotis K. - avatar Panagiotis K.

Twitter app downloads could put users at risk

Twitter announced that it is putting its MoPub acquisition to use by enabling Twitter marketers to promote and distribute mobile apps. There is a potential opportunity there, though, for attackers to...

Watch out for photos containing malware

29-03-2014 Hits:706 Security Panagiotis K. - avatar Panagiotis K.

Watch out for photos containing malware

Cybercriminals use images in a number of ways to infect your computer. In most cases, the photo itself is harmless; it's just a trick to get you to do something stupid....

Outlook Web App Coming to Android

05-04-2014 Hits:1191 Software Panagiotis K. - avatar Panagiotis K.

Outlook Web App Coming to Android

Microsoft's Steve Chew, a senior product marketing manager in the Exchange group, said in an Office blog on Monday that Outlook Web App (OWA) is coming to Google's Android platform...

Encrypted email service Virtru adds Office 365 compatibility

24-03-2014 Hits:934 Security Vasia L. - avatar Vasia L.

Encrypted email service Virtru adds Office 365 compatibility

Virtru has added Microsoft’s Office 365 and Outlook Desktop services to its list of compatible email platforms for its encryption product. The company, based in Washington, D.C. and launched in January,...